ProxKey - CERT-in Audit
ProxKey - CERT-in Audit
of
Mandated by
Authored By
Document Information
Author Information
Revision Controls
Table of Contents
1. BACKGROUND ...................................................................................................................................................................................... 5
2. SCOPE OF WORK.................................................................................................................................................................................. 5
3. SCOPE LIMITATIONS & ASSUMPTIONS ............................................................................................................................................. 7
4. AUDITOR INDEPENDENCE ................................................................................................................................................................... 8
5. CIRCULATION RESTRICTIONS ............................................................................................................................................................ 8
6. AUDIT DATE AND LOCATION .............................................................................................................................................................. 8
7. AUDITEE REPRESENTATIVES ............................................................................................................................................................. 9
8. AUDIT TEAM .......................................................................................................................................................................................... 9
9. LIST OF ACRONYMS AND ABBREVIATIONS ................................................................................................................................... 10
10. EXECUTIVE SUMMARY ....................................................................................................................................................................... 11
11. GENERAL SPECIFICATIONS .............................................................................................................................................................. 12
12. TECHNICAL SPECIFICATIONS ........................................................................................................................................................... 13
13. DETAILED SECURITY ASSESSMENT FINDINGS .............................................................................................................................. 14
1. Background
The X.509 Certificate Policy for India PKI mandates that the private key of a subscriber should be stored in a Hardware Cryptographic Module /
token which has been validated to FIPS 140-1/2 Level 3 for class 2 and class 3 DSCs. CCA has released the guidelines defining the security
requirements for crypto devices used by the end users in performing digital signatures functions. The crypto device is referred as a PKI Smart card
or a PKI crypto token.
As per the guidelines, the Token Manufacturer (OEM) or representative organization (in the absence of OEM office in India) should engage a Cert-
in empanelled auditor to carry out Smartcard Security Assessment. Hence M/s Pagaria Advisory Private Limited has engaged the services of
Kochar Consultants Private Limited to perform this assessment vide appointment letter dated February 20, 2023.
2. Scope of Work
As per the “Security Requirements for Crypto Devices” Version 2.0 issued by CCA on November 14, 2022, we have carried out the security
assessment of the Watchdata ProxKey Cryptographic Module.
The assessment was conducted as per the broad scope defined in the above guidelines, which comprises of the following audit agenda:
Functions Prior to User Authentication
User Authentication
Physical Security (CMVP)
Cryptographic Algorithms (CAVP Certificate)
Key Entry
Key Output
Key Zeroization
EMI / EMC
Power Up Self-Tests
Interface Specification
Mitigation of Other Attacks
Operating System Security
Key Storage
Key Zeroization
Application Integrity
Admin Password feature
General requirements
Audit Requirements
Our audit observations have been registered at a point in time. It may change at a later date if the system parameters are changed.
The responsibility for the design and implementation of the security controls including adequate disclosures is that of the management of the
OEM and that it is responsible for correcting control lapses, if any.
The OEM and the Authorized representative are responsible for its assertion. Our responsibility is to express an opinion on their assertion
based on our audit / observations.
The projection of any conclusions, based on our findings, to future periods is subject to the risk that:
Changes made to the hardware, design, application or system or controls.
Changes in processing requirements,
Changes required because of the passage of time, or changes in business or regulator or guidelines
Degree of compliance with the policies or procedures may alter the validity of such conclusions.
Any future known / unknown vulnerability or malware attack, may have altered the validity of such conclusions
4. Auditor Independence
We certify that none of the Officials / Directors of M/s Pagaria Advisory Private Limited is related with any of the Officials / Directors of Kochar
Consultants Private Limited Kochar Consultants Private Limited does not have any interest in the management of M/s Pagaria Advisory Private
Limited.
5. Circulation Restrictions
This report along with the annexures is meant for The Controller of Certifying Authorities (CCA) and M/s Pagaria Advisory Private Limited.
Further distribution of this report is at the sole discretion of the management of the respective organizations. The auditor is not liable for its use for
any other purpose or by any other person. The audit report is issued without any warranty or guarantee by the auditor and without any obligation
towards the auditor.
7. Auditee Representatives
Name Organization Designation Contact
Ankush Pagaria Pagaria Advisory Private Limited Project Consultant [email protected]
Tushar Bhor Pagaria Advisory Private Limited Senior Manager Support [email protected]
Victor Watchdata Technologies Pte Ltd Managing Director (International Business) [email protected]
8. Audit Team
The audit team comprised of the following members:
Standard FIPS 140-2 Level 3 certified vide Certificate No. 4159 dated February 17, 2022.
https://csrc.nist.gov/projects/cryptographic-module-validation-program/Certificate/4159
Security Policy Watchdata ProxKey FIPS 140-2 Non-Proprietary Security Policy Policy Version 1.0.4
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-
program/documents/security-policies/140sp4159.pdf
Reference Documents / Tools Watchdata ProxKey FIPS 140-2 Non-Proprietary Security Policy Policy Version 1.0.4
Watchdata ProxKey FIPS 140-2 Key Management version 1.0 dated 15/05/2018
CSP Version: PROXKey CSP India V3.0 & above
Supported Driver: Windows Driver Version : 6.0.0 & Above & 5.0.0 For Ubuntu , Linux & MAC
Compliant /
Sr. Audit Criteria Audit Observations & Recommendations Non-
Compliant
1. Functions Prior to User Authentication Compliant
The functions that can be performed before user
authentication shall:
a) be limited to access and use of public information such as Before user authentication, the user is only able to access
examination of public key certificates; and and see the token system information and public key
certificate details. Access to the certificate details is
available only after user authentication.
b) Shall not include any access or operation involving Private key cannot be used without user authentication.
private or secret key operations.
2. User Authentication: Compliant
User Authentication mechanism shall meet the following
requirements:
a) Authentication mechanism shall be such that a random Requirements are fully addressed by FIPS 140-2. Thus,
guess has less than 1 in 1,000,000 probability of success. no additional analysis has been performed.
As per Security Policy
The probability of a successful random attempt is 1/626,
which is less than 1/1,000,000. Assuming 10 attempts per
second via a scripted or automatic attack, the probability
of a success with multiple attempts in a one minute period
is 600/626, which is less than 1/100,000.
b) Authentication mechanism shall be such that multiple Requirements are fully addressed by FIPS 140-2. Thus,
random guesses in any one minute interval shall have no additional analysis has been performed.
b) The crypto device shall successfully undergo the process Requirements are fully addressed by FIPS 140-2. Thus,
of Cryptographic Module Validation Program (CMVP) of no additional analysis has been performed.
FIPS 140-2, Security Requirements for Cryptographic
Modules. These Security requirements cover different The certification details are available on
areas related to the design and implementation of a https://csrc.nist.gov/projects/cryptographic-module-
cryptographic module. A copy of such validation validation-program/Certificate/4159
certificate shall be submitted by the crypto device vendor
for each device.
4. Cryptographic Algorithms: Compliant
a) The crypto device shall successfully undergo FIPS The Watchdata ProxKey USB Token has successfully
Cryptographic Algorithm Validation Program (CAVP) for undergo FIPS Cryptographic Algorithm Validation
each FIPS algorithm claimed to be implemented. Program (CAVP) for the following list of FIPS-Approved
algorithms when operated in FIPS-mode.
Algorithm Algorithm
Cert #
AES 3196
CMAC (AES) 3196
DRBG 673
ECDSA Key Generation
ECDSA Public Key Validation
585
ECDSA Signature Generation
ECDSA Signature Verification
RSA Key Generation
RSA (PKCS#1 1.5) Signature
1630
Generation
RSA (PKCS#1 1.5) Signature
Verification
d) For FIPS 140-2 validated products that are not have There is no formal ADV_FSP.4 assurance. But, OEM has
ADV_FSP.4 or higher security assurance requirement, provided the complete functional specification.
the vendor should be required to provide a complete
functional specification
11. Key Management Document: Compliant
The documentation shall describe types of internal and user The Watchdata ProxKey FIPS 140-2 Non-Proprietary
keys and their life-cycle and states in terms of the following: Security Policy Policy Version 1.0.4 and “Key
Management” Version 1.0 dated 17/02/2022 has been
used as a reference to verify the required details.
a) Algorithm and mode for the key and the key size List of approved algorithms which the module can
implement, mode for the key and the key size is
documented.
b) Whether the key is generated onboard on the crypto The RSA\ECC Private and Public Key are generated by
device or imported the module with the FIPS 186-4 RSA Key Generation
method.
e) Functions / purposes the key is used for Described in the Platform Critical Security Parameters
Section 4 of the Security Policy
12. Mitigation of Other Attacks: Compliant
Mitigation of attacks takes place by following below
procedure:
The documentation shall describe which, if any, side The Mitigation Attacks version 1.0 document describes
channels are mitigated by the crypto device design. the attacks that are mitigated by the device design
Examples of side channel attacks are Simple Power Analysis
(SPA), Differential Power Analysis (DPA), Timing Analysis,
The document describes that module implements
and Fault Injection.
defenses against:
Hardware Mitigation Attack Mechanism
Software Mitigation Attack Mechanism
o Side channel analysis (Timing Analysis,
SPA/DPA, Simple/Differential
Electromagnetic Analysis)
o Fault Injection
The documentation shall describe how each attack is The Mitigation Attacks version 1.0 document describes
mitigated and what testing has been conducted to prove the how each attacks are mitigated.
effectiveness of mitigation.
The document describes that module implements
defenses against:
Hardware Mitigation Attack Mechanism
Software Mitigation Attack Mechanism
o Side channel analysis (Timing Analysis,
SPA/DPA, Simple/Differential
Electromagnetic Analysis)
o Fault Injection
13. Operating System Security: Compliant
If application software such as applets can be loaded on the
crypto device, the following requirements shall be met:
a) Self-Protection: The operating system shall be designed Requirements are fully addressed by FIPS 140-2. Thus,
to protect itself from external interference and tampering, no additional analysis has been performed.
including attack from applications.
b) Non-Bypassable: The security enforcing functions of the Requirements are fully addressed by FIPS 140-2. Thus,
operating system shall not be bypassable. no additional analysis has been performed.
c) Domain Isolation: The operating system shall provide Requirements are fully addressed by FIPS 140-2. Thus,
each application an execution domain that cannot be no additional analysis has been performed.
interfered with.
d) Identification & Authentication: The operating system Requirements are fully addressed by FIPS 140-2. Thus,
shall provide mechanism for users and applications to no additional analysis has been performed.
authenticate to the operating system for access control
purposes. The operating system shall protect the
authentication mechanism and 9 authentication
databases (e.g., plaintext or encrypted forms of
passwords and PINs) as part of self-protection.
e) Access Control: The operating system shall enforce an Requirements are fully addressed by FIPS 140-2. Thus,
access control policy in terms of applications being able no additional analysis has been performed.
b) Decryption shall require entry of password or PIN. In Only if the PIN Authentication is successful the private
other words, password or PIN shall be used to derive the key of the user shall be decrypted and available for use.
key encrypting key.
For both user PIN and Security Officer’s PIN, the PIN is
This is not a requirement for FIPS 140-2. Thus, this will hashed and truncated; and then encrypted using KEK to
require additional testing. Note that it is critical that the store in the module.
crypto device does not have information stored in the
crypto device that can be used to decrypt the key; it
should require some user entered information to
reconstitute the key decrypting key. This approach
provides added protection against physically hacking the
crypto device.
b) The resetting PIN of the crypto token holding a valid As per the IVG Guidelines , The CA shall provide key
encryption certificate issued before 01.01.2022 shall be escrow facility, where key pair is securely stored and
carried only after the authentication of the subscriber by managed by CA. The key shall be retrievable again by the
CA. The resetting password of the crypto device having DSC applicant at any point of time, even after expiry of
an encryption certificate shall be carried out only by the the certificate. This shall be retained by CA for minimum
Token Manufacturer or authorized representative of 7 years from the expiry of the certificate. CA shall allow
organization (in the absence of the OEM office in India). the download of the escrowed key only after a successful
video verification of the applicant' . For Reset of user
password for token having encryption certificate, the
subscriber will need to initialize the token and retrieve the
encryption key from the CA repository. In cases where the
period lapsed is more than 7 years from the
expiration date of the encryption certificate, the user will
need to submit the token physically to the OEM for
password reset after proper authentication of KYC of the
subscriber.
Admin password is used to perform various admin
functions such as unblock user pin, all options of security
officer, restore default application, initialize application,
initialize module, create application, import key, update
key, data encrypt/decrypt, set life cycle, set serial number
and inquire initial config information. These are as per the
security Policy submitted for FIPS 140-2 compliance.
18. General Requirements Compliant
a) Unique Serial Number shall be generated by the A Unique serial number is generated by the Cryptographic
Cryptographic Hardware manufacturer for each Token. Hardware manufacturer for each Token. The number is
Such Unique Serial Number should be stored inside the stored within the token file system and is also engraved
token file system and also engraved on the token shell. on the token shell.
b) The Cryptographic Hardware manufacturer shall provide The Watchdata Client User Tool (v6.0.0) shall be provided
necessary libraries to the CAs to read the make, model & to the CA’s to read the make, model & Unique Serial
Unique Serial Number from the token file system and Number from the token file system and record the same
record the same while generating key pair or while while generating key pair or while downloading the DSC
downloading the DSC into the token. into the token.
Libraries / API can be provided to CAs to read the token
make, model and unique serial number from the token file
system and CAs can record the same.
c) The Crypto Devices should have product-specific Token product specific interface in the form of middleware
interface software and should be made available for are available for the following operating systems
various versions of Windows, Mac, iOS, Linux, and Windows
Android by Manufacturers and Suppliers. Apple MAC operating System
Redhat Linux
Ubuntu Linux
Android
OEM. The certified product should be verifiable physically same is matching with FIPS certificate.
as well as electronically using software tools
The software embedded in the crypto device is from
‘Watchdata’ - OEM
The token middleware software electronically displays the
parameters like OEM Name, FIPS Validation Level &
Validation No.
f)Other than OEM offering, the customization of tokens and Tokens are only offered as standard OEM offering.
custom branding is not allowed. The OEM interface
software should allow the co-existence of other crypto
OEM interfaces in the user’s system The OEM software does not interfere with functioning of
other OEM Crypto Token devices on User’s System.
Same has been verified by installing simultaneously using
the ProxKey Token with other OEM brand tokens on the
same system.
g) Crypto Device having Historical FIPS certificate status, FIPS Status is ACTIVE as per the FIPS Portal-
relied on this document, to be discontinued by CAs from https://csrc.nist.gov/projects/cryptographic-module-
1st April 2023 onwards validation-program/certificate/4159
19. Audit Requirements Compliant
a) For the compliance audit, the security requirements The Token offering are in compliance with the underlying
mentioned in this document refer to the underlying FIPS certification on the following aspects including
certification (FIPS) of the crypto device, for cross-
verification. The overall security requirements mentioned
in this document should refer to FIPS where the a. Smart Card Chip AS518 and K023314A
certification of both hardware and firmware is covered
under the same OEM & version. b. Auto Run in the form of SPI Flash forms part of the
hardware block diagram validated in the FIPS
security policy (Figure No 2)
Dear Sir,
We refer to your appointment letter dated February 20, 2023, for security assessment of your Watchdata
ProxKey Cryptographic Module against Guidelines for Security Requirements for Crypto Device version
2.0, issued by CCA on 14/11/2022.
The OEM Watchdata has authorized its Authorized Representative in India, M/s Pagaria Advisory Private
Limited to engage an CERT-In empanelled auditor and get the required assessment done vide their letter
dated February 20, 2023.
M/s Pagaria Advisory Private Limited on behalf of OEM Watchdata is responsible for its assertion. Our
responsibility is to express an opinion on management’s assertion based on our audit.
We have carried out the assessment and validated the assertions by M/s Pagaria Advisory Private
Limited on behalf of OEM Watchdata against the Guidelines for Security Requirements for Crypto Device
version 2.0, issued by CCA. In our opinion, except for the non-compliances summarized in this report the
Authorized Representatives assertion is fairly stated, in all material respects, in accordance with the said
Guidelines, during the period for which the audit was done.
The projection of any conclusions, based on our findings, to future periods is subject to the risk that:
Changes made to the hardware, design, application or system or controls.
Changes in processing requirements,
Changes required because of the passage of time, or changes in business or regulator or guidelines
Degree of compliance with the policies or procedures may alter the validity of such conclusions.
Any future known / unknown vulnerability or malware attack, may have altered the validity of such
conclusions
This report along with the annexures is meant for The Controller of Certifying Authorities (CCA) and
M/s Pagaria Advisory Private Limited. Further distribution of this report is at the sole discretion of the
management of the respective organizations. The auditor is not liable for its use for any other purpose or
by any other person. The audit report is issued without any warranty or guarantee by the auditor and
without any obligation towards the auditor.
Kamlesh
Digitally signed by Kamlesh Baburao Kale
DN: c=IN, o=Personal,
2.5.4.20=1f9586a8b90286714bbc72dd3f4dda644a206c3d3cb
67af9012dc45f777de43c, postalCode=400081,
Baburao Kale
st=Maharashtra,
serialNumber=510eb3e60d1a87ac8793913811676308583cb
b8cbf0f25fa6c27521582a9bf14, cn=Kamlesh Baburao Kale
Date: 2023.03.13 12:26:41 +05'30'
Kamlesh Kale
PGDBA, ADCL, CISA, CISM, CHFI. CEH. ISO 27001:2013 LA
Head IT GRC | IT Security
CISA Certificate No: 20163284
Place: Mumbai.
Date: 13/03/2023
Encl: Smartcard Security Assessment of Watchdata ProxKey Cryptographic Module Audit Report Ver. 1.0